As pervasive as cloud technology is -- and as persuasive as the arguments are for using it -- the cloud has its limits. Some companies will always have security concerns about storing data in the cloud and certain high-transaction applications will always be better suited for on-premis...

The Internet of Things needs an entirely new security model, or does it? Can we save some old and tested controls for the latest emerging and different technology environments? In his session at Internet of @ThingsExpo, Davi Ottenheimer, EMC Senior Director of Trust, will review hands-...

SYS-CON Events announced today that IDenticard will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY.
IDenticard™ is the security division of Brady Corp (NYSE: BRC), a $1.5 billion manufacturer of ...

Every organization should follow a proactive rather than a reactive approach to protect against threats, risks, and vulnerabilities to which if their IT infrastructure is exposed can lead to data loss, regulatory penalties, lawsuits, and damaged reputation. Moving on the same lines, to...

The move to the cloud brings a number of new security challenges, but the application remains your last line of defense.
In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, to discuss how developers are extremely well-poised to perform tasks critical for securin...

JP Morgan Chase has announced that in June and July of this year over 76 million retail clients and over 7 million business clients had there personal information stolen from various company websites. The sites identified were: Chase.com, JPMorganOnline, Chase Mobile and JPMorgan Mobil...

A growing number of websites allow visitors to log in using a digital identity from a trusted 3rd party -- like Facebook, Microsoft, PayPal, or Google. The fancy term for this is “federated identity,” but most people call it Bring Your Own Identity, or BYOID.

Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensi...

The promise of easy, rapid, and low-cost deployment is luring increasing numbers to the cloud. Is security the only remaining obstacle to total domination by the cloud? In his session at 14th Cloud Expo, John Gunn, VP of Corporate Communications for VASCO Data Security, will examine ho...

IDenticard Access Control is a leading manufacturer of integrated access control solutions to protect employees, visitors, and facilities. Owned by Brady Corporation (NYSE:BRC), a $1.15 billion manufacturer of identification products, IDenticard Access Control draws on its 30 years of ...

Recent high profile security breaches at major online websites tell us static passwords are not the answer. Even recent SMS security additions to consumer websites do little to address the issue.
Fortunately, a more secure authentication system is available for consumer websites that ...

Evelyn de Souza is a cloud compliance and data privacy strategy leader at Cisco responsible for championing solutions to address emerging industry trends. She is a strong proponent of building repeatable processes that enable organizations to sustain compliance while optimizing data se...

It is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. Andi Mann from CA Technologies recently pointed out that, at every turn, customers are interacting more and more with businesses through appli...

APIs - application programming interfaces -- are an old technology that has become today's hottest method for getting critical data to mobile apps. APIs are good for business. APIs drove $2 billion in business for Expedia by securely exposing valuable content to its affiliate network.
...

A recent press report quoted unnamed US intelligence sources saying Russia had no intention of invading the Ukraine. The appraisal became the subject of considerable debate when Russian President Vladimir Putin ordered his nation's military into Ukraine's Crimea region. Follow-on media...

New and flexible ways to make changes of a Windows Server 2012 installation after the fact are available. And IT pros can now convert a server from and to Server Core, and change the availability of server components that are previously committed at an installation time. This introduce...

As the pace of life appears to quicken, customers are demanding services that are faster, more mobile and more convenient. Microwave meals are ready in two ticks, a trip to an exotic island is only a couple of mouse clicks away and when travelling to a new destination, we trust GPS dev...

The huge growth in mobile technologies and new free collaboration services (e.g. Dropbox) is forcing organizations to find ways to coexist with these technologies, taking advantage of the efficiencies they bring, and ensuring that their data assets are adequately protected. Organizatio...

And you thought FourSquare was a security risk… Mobile phones with great cameras are an awesome tool. Many of these end up on Facebook, visible to friends, family and, well, friends of friends and maybe even the public. They get shared around so much, you can’t really be sure where...

In most organizations today, there is sensitive data that is overexposed and vulnerable to misuse or theft, leaving IT in an ongoing race to prevent data loss. Packet sniffers, firewalls, virus scanners, and spam filters are doing a good job securing the borders, but what about insider...

Cloud Expo

Cloud Computing & All That
It Touches In One Location Cloud Computing - Big Data - Internet of Things
SDDC - WebRTC - DevOps
Cloud computing is become a norm within enterprise IT.

The competition among public cloud providers is red hot, private cloud continues to grab increasing shares of IT budgets, and hybrid cloud strategies are beginning to conquer the enterprise IT world.

Big Data is driving dramatic leaps in resource requirements and capabilities, and now the Internet of Things promises an exponential leap in the size of the Internet and Worldwide Web.

The world of SDX now encompasses Software-Defined Data Centers (SDDCs) as the technology world prepares for the Zettabyte Age.

Add the key topics of WebRTC and DevOps into the mix, and you have three days of pure cloud computing that you simply cannot miss.

Delegates will leave Cloud Expo with dramatically increased understanding the entire scope of the entire cloud computing spectrum from storage to security.

Cloud Expo - the world's most established event - offers a vast selection of 130+ technical and strategic Industry Keynotes, General Sessions, Breakout Sessions, and signature Power Panels. The exhibition floor features 100+ exhibitors offering specific solutions and comprehensive strategies. The floor also features two Demo Theaters that give delegates the opportunity to get even closer to the technology they want to see and the people who offer it.

Attend Cloud Expo. Craft your own custom experience. Learn the latest from the world's best technologists. Find the vendors you want and put them to the test.